Modern security devices are facing many constraints. Besides being efficient in terms of speed and area, they have to achieve high security level and resist against attacks aimed at recovering the secret key. Many common security devices are based on a general-purpose processor (e.g. ARM, PowerPC, NIOS II) realizing communication protocols and a hardware coprocessor dedicated for acceleration of cryptographic algorithms. In this commonly adopted solution, the general-purpose processor operates with secret keys in clear. This way, an intentional or unintentional modification of firmware can lead to secret keys disclosure. In this work, processor cryptographic extension is presented. The platform is based on a NIOS II processor with additiona...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Cryptographic algorithms need infrastructure for testing them against security attacks. Normally man...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
The growing problem of breaches in information security in recent years has created a demand for ear...
This work illustrates the research activities related to the implementation of a suite of hardware c...
The growing problem of breaches in information security in recent years has created a demand for ear...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Modern security devices are facing many constraints. Besides being efficient in terms of speed and a...
International audienceGeneral-purpose processors are not suitable for secure cryptographic key manag...
International audienceWhen used in cryptographic applications, general-purpose proces- sors are ofte...
When used in cryptographic applications, generalpurpose processors are often completed by a cryptogr...
International audienceIn data security systems, general purpose processors (GPPs) are often extended...
Cryptographic algorithms need infrastructure for testing them against security attacks. Normally man...
Cryptarchi 2010Hardware cryptographic systems must fulfill contradictory requirements: fast parallel...
Cryptographic processing is a critical component of secure Internet-connected computing systems. Fur...
The growing problem of breaches in information security in recent years has created a demand for ear...
This work illustrates the research activities related to the implementation of a suite of hardware c...
The growing problem of breaches in information security in recent years has created a demand for ear...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they...
The increasing need for security has caused system designers to consider placing some security suppo...
International audienceThe paper presents a novel concept of processor aimed at symmetric-key cryptog...